svalue
char *svalue;
svalue = strchr(entry, ':');
if (svalue == NULL) { /* missing value string */
*svalue++ = '\0';
SKIPWS(svalue);
tmp = svalue;
res = read_enum_value(NULL, svalue, enum_nvs,
value = (int)strtol(svalue, &end, 10);
if ((svalue == end) || (*end != '\0')) {
longlong_t svalue = 0, factor = 1;
svalue = strtol(str, &sp, 0);
svalue *= factor;
if (svalue < INT_MIN || svalue > INT_MAX)
mesg(MDEBUG, "got scaled value %d\n", (int)svalue);
return ((int)svalue);
ulong_t svalue;
svalue = (ulong_t)sym.st_value;
if (svalue <= addr) {
(svalue >= (ulong_t)lsymr->st_value))) {
if (lsymr && (lsymr->st_value == svalue))
(svalue >= (ulong_t)symr->st_value)) {
if (symr && (symr->st_value == svalue))
nlp->svalue = nlp->value / sizeof (UNIT);
bucket_of_entry = (nlp->svalue - lowpc) / scale;
bucket_of_code = (nlp->svalue + UNITS_TO_CODE - lowpc) / scale;
"to 0x%llx\n", nlp->svalue,
nlp->svalue + UNITS_TO_CODE);
(void) printf(" %lld ", timesortnlp[i]->svalue);
svalue0 = nl[j].svalue;
svalue1 = nl[j+1].svalue;
pctype svalue; /* entry point aligned to histograms */
CP(tagfbuf, svalue(vi_TAGS));
execlp((char *)svalue(vi_SHELL), "sh", "-c", genbuf, (char *)0);
filioerr(svalue(vi_SHELL));
if (strlen(svalue(vi_DIRECTORY)) > (PATH_MAX -13))
CP(tfname, svalue(vi_DIRECTORY));
execlp((char *)svalue(vi_SHELL), (char *)svalue(vi_SHELL),
svalue(vi_SHELL));
execlp(EXRECOVER, "exrecover", "-x", svalue(vi_DIRECTORY), file, (char *) 0);
execlp(EXRECOVER, "exrecover", svalue(vi_DIRECTORY), file, (char *) 0);
isa(svalue(vi_PARAGRAPHS)) || isa(svalue(vi_SECTIONS)));
isa(svalue(vi_SECTIONS))) {
int svalue;
svalue = value;
while (svalue > 0) {
*--bp = (svalue % 10) + '0';
svalue /= 10;
char *svalue;
if (!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue))
rparams->realm_dbname = svalue;
if (!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue))
rparams->realm_kdc_ports = svalue;
if (!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue))
rparams->realm_kdc_tcp_ports = svalue;
if (!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue))
rparams->realm_acl_file = svalue;
if (!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue))
rparams->realm_mkey_name = svalue;
if (!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
if (!krb5_string_to_enctype(svalue, &rparams->realm_enctype))
krb5_xfree(svalue);
if (!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue))
rparams->realm_stash_file = svalue;
if (!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
if (!krb5_string_to_timestamp(svalue,
krb5_xfree(svalue);
if (!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
sp = svalue;
krb5_xfree(svalue);
svalue = NULL;
krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue);
if (svalue == NULL) {
svalue = strdup(DEFAULT_ENCTYPE_LIST);
if (svalue != NULL) {
krb5_string_to_keysalts(svalue,
krb5_xfree(svalue);
svalue = NULL;
char *svalue;
!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
params.admin_server = svalue;
!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
params.dbname = svalue;
!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
params.admin_keytab = svalue;
!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
params.acl_file = svalue;
!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
params.dict_file = svalue;
!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
params.mkey_name = svalue;
!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
if (!krb5_string_to_enctype(svalue, ¶ms.enctype)) {
krb5_xfree(svalue);
!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
params.stash_file = svalue;
!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
if (!krb5_string_to_timestamp(svalue, ¶ms.expiration)) {
krb5_xfree(svalue);
!krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue)) {
sp = svalue;
krb5_xfree(svalue);
svalue = NULL;
krb5_aprof_get_string(aprofile, hierarchy, TRUE, &svalue);
if (svalue == NULL)
svalue = strdup(DEFAULT_ENCTYPE_LIST);
krb5_string_to_keysalts(svalue,
if (svalue)
krb5_xfree(svalue);
svalue = NULL;
TRUE, &svalue);
if (svalue == NULL) {
params.kpasswd_server = svalue;
svalue = NULL;
TRUE, &svalue);
if (svalue != NULL) {
if (strcasecmp(svalue, "RPCSEC_GSS") == 0) {
} else if (strcasecmp(svalue, "SET_CHANGE") == 0) {
if (svalue)
krb5_xfree(svalue);
TRUE, &svalue)) {
if (strncasecmp(svalue, "Y", 1) == 0)
if (strncasecmp(svalue, "true", 4) == 0)
krb5_xfree(svalue);
TRUE, &svalue)) {
params.iprop_polltime = strdup(svalue);
krb5_xfree(svalue);
char *dn = 0, *skey, *svalue, *str;
if ((svalue = am(myself, value->dsize + 1)) == 0) {
(void) memcpy(svalue, value->dptr, value->dsize);
sfree(svalue);
myself, statP, skey, svalue, t->dbId, map);
sfree(svalue);
myself, skey, svalue, t->dbId, map);
sfree(svalue);
myself, skey, svalue, t->dbId, map);
myself, skey, svalue, t->dbId, map);
sfree(svalue);
svalue, dn, t->dbId, map);
svalue, t->dbId, map);
sfree(svalue);
sfree(svalue);
char *value, *svalue, *rdn = NULL;
for (value = rdn, svalue = NULL; *value != '\0'; value++) {
if (svalue &&
addSAttr2RuleValue(rdn, svalue, rv)
svalue = NULL;
svalue = value + 1;
if (svalue && addSAttr2RuleValue(rdn, svalue, rv) == -1) {
return svalue(o);
*name = svalue(kvalue); /* it is its own name */
*name = svalue(&p->k[b]);
((weakkey = strchr(svalue(mode), 'k')),
(weakvalue = strchr(svalue(mode), 'v')),
? svalue(L->top - 1)
return svalue(L->top - 1);
memcpy(buffer+tl, svalue(top-i), l * sizeof(char));
if (ttisstring(obj) && luaO_str2d(svalue(obj), tsvalue(obj)->len, &num)) {